ISARA Insights Blog

Featured Blog Post

The ABCs of Harvest and Decrypt

Philip Lafrance
Feb 24, 2025

As large-scale quantum computing inches ever closer, the urgency to protect our digital assets now from future threats is growing. Around the world, organizations of all kinds are being strongly encouraged to start preparing for quantum-capable adversaries. And for several very good reasons. If you’re familiar with the quantum-threat to cryptography, you’ve likely heard that current encryption algorithms are vulnerable to quantum computing attacks. You may have come across discussions about post-quantum cryptography standards. And perhaps you’ve heard that today’s encrypted data could be at risk from tomorrow’s quantum-enabled attackers.

Read more

Tags:

Mastering the Quantum Challenge for Machine Identities

Mike Brown
Nov 11, 2020

It is no secret that cybersecurity threats are ever-evolving. Each day, security professionals around the world receive reports of new vulnerabilities, new attack vectors, and new challenges that need…

Read more


Microsoft’s CryptoAPI flaw/CurveBall: a teaser of the quantum threat

Mike Brown
Jan 17, 2020

The National Security Agency recently discovered a major cryptographic flaw in Microsoft’s low-level code within their operating system. This flaw, now known as CurveBall, was found within Windows CryptoAPI…

Read more


How Quantum Computing’s Threat to Security is Different from All Other Security Breaches

Mike Brown
Jan 11, 2018

The quantum threat represents the first time in history that a cybersecurity breach will be the result of a complete break of modern public-key cryptography. For many, this information might come as a…

Read more